scispace - formally typeset
Search or ask a question
Author

Evelyne Studer

Bio: Evelyne Studer is an academic researcher from University of Zurich. The author has contributed to research in topics: Context (language use). The author has an hindex of 1, co-authored 1 publications receiving 72 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The changing legal cybersecurity environment in the Internet of Things context is examined, which discusses selected applicable international regulations as well as alternative approaches to addressing the security issues arising in the internet of Things.

100 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this article, the authors applied a qualitative case study design involving 26 semi-structured interviews with leading members of firms, including chief digital officers and chief executive officers, and found that management desire to increase control and enable real-time performance measurement is a significant driving force behind Industry 4.0, alongside production factors.

542 citations

Journal ArticleDOI
TL;DR: A unique taxonomy is provided, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses.
Abstract: The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research community. To this end, several surveys were put forward addressing various IoT-centric topics, including intrusion detection systems, threat modeling, and emerging technologies. In contrast, in this paper, we exclusively focus on the ever-evolving IoT vulnerabilities. In this context, we initially provide a comprehensive classification of state-of-the-art surveys, which address various dimensions of the IoT paradigm. This aims at facilitating IoT research endeavors by amalgamating, comparing, and contrasting dispersed research contributions. Subsequently, we provide a unique taxonomy, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses. This aims at providing the reader with a multidimensional research perspective related to IoT vulnerabilities, including their technical details and consequences, which is postulated to be leveraged for remediation objectives. Additionally, motivated by the lack of empirical (and malicious) data related to the IoT paradigm, this paper also presents a first look on Internet-scale IoT exploitations by drawing upon more than 1.2 GB of macroscopic, passive measurements’ data. This aims at practically highlighting the severity of the IoT problem, while providing operational situational awareness capabilities, which undoubtedly would aid in the mitigation task, at large. Insightful findings, inferences and outcomes in addition to open challenges and research problems are also disclosed in this paper, which we hope would pave the way for future research endeavors addressing theoretical and empirical aspects related to the imperative topic of IoT security.

451 citations

Journal ArticleDOI
TL;DR: The purpose of the study is to analyze categorically recent advances through qualitative and segmentation methods allowing to reveal trends and areas of opportunity in the industry sense of 4.0 in order to obtain research gaps that may be executed in organizational systems on the value chain.
Abstract: The evolution of markets and customer requirements with highest level of precision, has been achieved created with technology and information systems, a new way of make the operations in the companies, and just the companies with the ability to adapt faster to technological innovations may remain on the market. The last industrial revolution, known as industry 4.0 perceives the operations as a holistic system, its represents a challenge that must be fulfilled and faced in order to achieve stability and permanence in the market, from the point of view of the world economies. In the organizational and business area all the operations must be linked to computer systems and management of information in the network, which causes greater efficiency in the flow. With this new perception of industry and the business, it involves different analytical tools that aim at bigger efficiency in the service to the consumers, resulting in a greater competitiveness in the market and making the differentiator. This work is one of the first surveys that provides an extensive analysis and review of 110 publications that appear from 1/01/12 to 20/02/17. The purpose of the study is to analyze categorically recent advances through qualitative and segmentation methods allowing to reveal trends and areas of opportunity in the industry sense of 4.0 in order to obtain research gaps that may be executed in organizational systems on the value chain. Another point is to be a reference in future research related to the categories selected in this study.

195 citations

Journal ArticleDOI
TL;DR: Findings reveal that ‘Governance’ is documented as the most significant category of barriers for smart city development followed by ‘Economic;’ ‘Technology’; ‘Social’, ‘Environmental’ and ‘Legal and Ethical’.
Abstract: Smart city development is gaining considerable recognition in the systematic literature and international policies throughout the world. The study aims to identify the key barriers of smart cities from a review of existing literature and views of experts in this area. This work further makes an attempt on the prioritisation of barriers to recognise the most important barrier category and ranking of specific barriers within the categories to the development of smart cities in India. Through the existing literature, this work explored 31 barriers of smart cities development and divided them into six categories. This research work employed fuzzy Analytic Hierarchy Process (AHP) technique to prioritise the selected barriers. Findings reveal that ‘Governance’ is documented as the most significant category of barriers for smart city development followed by ‘Economic; ‘Technology’; ‘Social’; ‘Environmental’ and ‘Legal and Ethical’. In this work, authors also performed sensitivity analysis to validate the findings of study. This research is useful to the government and policymakers for eradicating the potential interferences in smart city development initiatives in developing countries like India.

167 citations

Journal ArticleDOI
TL;DR: An edge-centric IoT architecture is presented and extensively review the edge-based IoT security research efforts in the context of security architecture designs, firewalls, intrusion detection systems, authentication and authorization protocols, and privacy-preserving mechanisms.

157 citations